Published February 27, 2015
Reports of "Craigslist résumé" viruses have skyrocketed in recent months. Some of our clients here at New River Computing have unfortunately fallen victim to this recent outbreak. Thankfully, we've been successful at cleaning up the aftermath, but often the remediation process is long and arduous due to the sophistication of the malware. This particular malware campaign has been… Read more
Published November 10, 2014
Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched Jerome Segura, a senior security researcher at Malwarebytes—catch some of these… Read more
Published November 03, 2014
George Probst, NRC's web designer, was asked early this year to test out a new underwater camera rig that films 360° footage. In addition to George's work at NRC, he's also an accomplished underwater wildlife photographer, who specializes in shark. George took the Kolor Abyss 360 on his recent great white shark diving trip to Isla de Guadalupe, and was able to capture some close-up footage of… Read more
Published July 28, 2014
Many of you know George Probst as NRC’s graphic designer and web developer, but there’s more than marketing in his tool belt. When he’s not working, George has some interesting hobbies: running, Metallica concerts, and…shark diving. At least once a year, he ventures to Guadalupe, Mexico to swim with great white sharks. Not only does George swim with them, but he has also developed a keen… Read more
Published April 25, 2014
Peer-to-Peer or P2P is a method of sharing of files between two or more computers on the Internet. Users share files via P2P by using peer-to-peer applications such as Gnutella, KaZaA, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey, BearShare etc., and list goes on and on. How P2P Works The P2P application takes a piece of allotted data or sometimes whole directories… Read more